close
1.

図書

図書
Sihan Qing, Dieter Gollmann, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2836
所蔵情報: loading…
目次情報: 続きを見る
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST / Duncan S. Wong ; Karyin Fung ; Joseph K. Liu ; Victor K. Wei
A Policy Based Framework for Access Control / Ricardo Nabhen ; Edgard Jamhour ; Carlos Maziero
Trading-Off Type-Inference Memory Complexity against Communication / Konstantin Hyppönen ; David Naccache ; Elena Trichina ; Alexei Tchoulkine
Security Remarks on a Group Signature Scheme with Member Deletion / Guilin Wang ; Feng Bao ; Jianying Zhou ; Robert H. Deng
An Efficient Known Plaintext Attack on FEA-M / Hongjun Wu
An Efficient Public-Key Framework / Robert Deng
ROCEM: Robust Certified E-mail System Based on Server-Supported Signature / Jong-Phil Yang ; Chul Sur ; Kyung Hyune Rhee
Practical Service Charge for P2P Content Distribution / Jose Antonio Onieva ; Javier Lopez
ICMP Traceback with Cumulative Path, an Efficient Solution for IP Traceback / Henry C.J. Lee ; Vrizlynn L.L. Thing ; Yi Xu ; Miao Ma
A Lattice Based General Blind Watermark Scheme / Yongliang Liu ; Wen Gao ; Zhao Wang ; Shaohui Liu
Role-Based Access Control and the Access Control Matrix / Gregory Saunders ; Michael Hitchens ; Vijay Varadharajan
Broadcast Encryption Schemes Based on the Sectioned Key Tree / Miodrag J. Mihaljevic
Research on the Collusion Estimation / Gang Li ; Jie Yang
Multiple Description Coding for Image Data Hiding Jointly in the Spatial and DCT Domains / Mohsen Ashourian ; Yo-Sung Ho
Protocols for Malicious Host Revocation / Oscar Esparza ; Miguel Soriano ; Jose L. Muñoz ; Jordi Forne
A DWT-Based Digital Video Watermarking Scheme with Error Correcting Code / Pik-Wah Chan ; Michael R. Lyu
A Novel Two-Level Trust Model for Grid / Tie-Yan Li ; HuaFei Zhu ; Kwok-Yan Lam
Practical t-out-n Oblivious Transfer and Its Applications / Qian-Hong Wu ; Jian-Hong Zhang ; Yu-Min Wang
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme / Yongdong Wu
ID-Based Distributed "Magic Ink" Signature from Pairings / Yan Xie ; Fangguo Zhang ; Xiaofeng Chen
A Simple Anonymous Fingerprinting Scheme Based on Blind Signature / Shuwang Lü ; Zhenhua Liu
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives / Yang Cui ; Kazukuni Kobara ; Hideki Imai
A Security Verification Method for Information Flow Security Policies Implemented in Operating Systems / Xiao-dong Yi ; Xue-jun Yang
A Novel Efficient Group Signature Scheme with Forward Security / Jianhong Zhang ; Qianhong Wu ; Yumin Wang
Variations of Diffie-Hellman Problem
A Study on the Covert Channel Detection of TCP/IP Header Using Support Vector Machine / Taeshik Sohn ; JungTaek Seo ; Jongsub Moon
A Research on Intrusion Detection Based on Unsupervised Clustering and Support Vector Machine / Min Luo ; Lina Wang ; Huanguo Zhang ; Jin Chen
UC-RBAC: A Usage Constrained Role-Based Access Control Model / Zhen Xu ; Dengguo Feng ; Lan Li ; Hua Chen
(Virtually) Free Randomization Techniques for Elliptic Curve Cryptography / Mathieu Ciet ; Marc Joye
An Optimized Multi-bits Blind Watermarking Scheme / Xiaoqiang Li ; Xiangyang Xue ; Wei Li
A Compound Intrusion Detection Model / Jianhua Sun ; Hai Jin ; Hao Chen ; Qian Zhang ; Zongfen Han
An Efficient Convertible Authenticated Encryption Scheme and Its Variant / Hui-Feng Huang ; Chin-Chen Chang
Space-Economical Reassembly for Intrusion Detection System / Meng Zhang ; Jiu-bin Ju
A Functional Decomposition of Virus and Worm Programs / J. Krishna Murthy
Author Index
A Fast Square Root Computation Using the Frobenius Mapping / Wang Feng ; Yasuyuki Nogami ; Yoshitaka Morikawa
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption / Dang Nguyen Duc ; Jung Hee Cheon ; Kwangjo Kim
Secure Route Structures for the Fast Dispatch of Large-Scale Mobile Agents / Yan Wang ; Chi-Hung Chi ; Tieyan Li
2.

図書

図書
Peng Ning, Sihan Qing, Ninghui Li (eds.)
出版情報: Berlin : Springer, c2006  xiv, 558 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4307
所蔵情報: loading…
3.

図書

図書
Sihan Qing ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xiv, 492 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3783
所蔵情報: loading…
4.

図書

図書
Javier Lopez, Sihan Qing, Eiji Okamoto (eds.)
出版情報: Berlin : Springer, c2004  xi, 564 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3269
所蔵情報: loading…
目次情報: 続きを見る
On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez
On the Security of a Multi-party Certified Email Protocol / Jianying Zhou
Robust Metering Schemes for General Access Structures / Ventzislav Nikov ; Svetla Nikova ; Bart Preneel
PAYFLUX - Secure Electronic Payment in Mobile AdHoc Networks / Klaus Herrmann ; Michael A. Jaeger
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN / Tieyan Li ; Yongdong Wu ; Di Ma ; Huafei Zhu ; Robert H. Deng
Provably Secure Authenticated Tree Based Group Key Agreement / Ratna Dutta ; Rana Barua ; Palash Sarkar
Taxonomic Consideration to OAEP Variants and Their Security / Yuichi Komano ; Kazuo Ohta
Factorization-Based Fail-Stop Signatures Revisited / Katja Schmidt-Samoa
A Qualitative Evaluation of Security Patterns / Spyros T. Halkidis ; Alexander Chatzigeorgiou ; George Stephanides
Type Inferability and Decidability of the Security Problem Against Inference Attacks on Object-Oriented Databases / Yasunori Ishihara ; Yumi Shimakawa ; Toru Fujiwara
Volatile Memory Computer Forensics to Detect Kernel Level Compromise / Sandra Ring ; Eric Cole
A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet / Ilanit Moodahi ; Ehud Gudes ; Oz Lavee ; Amnon Meisels
Hydan: Hiding Information in Program Binaries / Rakan El-Khalil ; Angelos D. Keromytis
A Semi-fragile Steganographic Digital Signature for Images / Luke Hebbes ; Andrew Lenaghan
Identification of Traitors Using a Trellis / Marcel Fernandez ; Miguel Soriano
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation / Joaquin Garcia ; Fabien Autrel ; Joan Borrell ; Sergio Castillo ; Frederic Cuppens ; Guillermo Navarro
Reflector Attack Traceback System with Pushback Based iTrace Mechanism / Hyung-Woo Lee ; Sung-Hyun Yun ; Taekyoung Kwon ; Jae-Sung Kim ; Hee-Un Park ; Nam-Ho Oh
Automatic Covert Channel Analysis of a Multilevel Secure Component / Ruggero Lanotte ; Andrea Maggiolo-Schettini ; Simone Tini ; Angelo Troina ; Enrico Tronci
Sound Approximations to Diffie-Hellman Using Rewrite Rules / Christopher Lynch ; Catherine Meadows
On Randomized Addition-Subtraction Chains to Counteract Differential Power Attacks / Anton Kargl ; Gotz Wiesend
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm / Sang Gyoo Sim ; Dong Jin Park ; Pil Joong Lee
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure / Dong-Guk Han ; Tetsuya Izu ; Jongin Lim ; Kouichi Sakurai
Modelling Dependencies Between Classifiers in Mobile Masquerader Detection / Oleksiy Mazhelis ; Seppo Puuronen ; Jari Veijalainen
Threat Analysis on NEtwork MObility (NEMO) / Souhwan Jung ; Fan Zhao ; S. Felix Wu ; HyunGon Kim
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept / Michelangelo Giansiracusa ; Selwyn Russell ; Andrew Clark ; Volker Roth
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV) / Tao Wan ; Evangelos Kranakis ; Paul C. van Oorschot
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management / Miodrag J. Mihaljevic ; Marc P.C. Fossorier ; Hideki Imai
Security Analysis of the Generalized Self-shrinking Generator / Bin Zhang ; Hongjun Wu ; Dengguo Feng ; Feng Bao
On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis / Bo-Yin Yang ; Jiun-Ming Chen ; Nicolas T. Courtois
On Some Weak Extensions of AES and BES / Jean Monnerat ; Serge Vaudenay
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario / Slobodan Petrovic ; Amparo Fúster-Sabater
Transient Fault Induction Attacks on XTR / Mathieu Ciet ; Christophe Giraud
Adaptive-CCA on OpenPGP Revisited / Hsi-Chung Lin ; Sung-Ming Yen ; Guan-Ting Chen
A New Key-Insulated Signature Scheme / Nicolás González-Deleito ; Olivier Markowitch ; Emmanuel Dall'Olio
Secure Hierarchical Identity Based Signature and Its Application / Sherman S.M. Chow ; Lucas C.K. Hui ; Siu Ming Yiu ; K.P. Chow
Multi-designated Verifiers Signatures / Fabien Laguillaumie ; Damien Vergnaud
Dynamic Access Control for Multi-privileged Group Communications
An Efficient Authentication Scheme Using Recovery Information in Signature / Kihun Hong
Time-Scoped Searching of Encrypted Audit Logs / Darren Davis ; Fabian Monrose ; Michael K. Reiter
Rights-Carrying and Self-enforcing Information Objects for Information Distribution Systems / Habtamu Abie ; PÃ¥l Spilling ; Bent Foyn
Author Index
On the Minimal Assumptions of Group Signature Schemes / Michel Abdalla ; Bogdan Warinschi
Perfect Concurrent Signature Schemes / Willy Susilo ; Yi Mu ; Fangguo Zhang
New Identity-Based Ring Signature Schemes / Javier Herranz ; Germán Sáez
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼